The Proper Use of Pointers in Go (Golang)

photo 1497005367839 6e852de72767

Go has become increasingly popular in recent years, especially in my local area. It has been consistently displacing other backend languages like Ruby, Python, C# and Java. Go is wanted for its simplicity, explicitness, speed, and low memory consumption. Many developers that are new to the language, or new to a language that can handle … Read more

How to Recursively Traverse JSON Objects

photo 1527266237111 a4989d028b4b

I’ve found that it’s quite rare to require recursion in application code, however, every now and then I need to write a function that operates on a tree of unknown depth, like a JSON object, and it’s often best done recursively. While recursion can be rare, it’s important to at least be able to recognize … Read more

How to Create a Bitcoin Savings Wallet Using Qvault and Sentinel

photo 1550565227 a6144af19c78

DEPRECATED NOTICE This article will remain live for historic purposes, but the Qvault password manager is a deprecated project. Qvault and Samourai’s Sentinel are a match made in heaven for anyone wanting a secure and easy solution for Bitcoin savings. Why? A watch-only wallet is perfect for users who want a high-security savings account. It … Read more

How to Securely Backup a Seed Phrase

photo 1523348837708 15d4a09cfac2

Many newcomers to the Bitcoin and cryptocurrency space seem interested in holding their own private keys. As we know, not your keys not your coins. Dangers In order to spend Bitcoins, a user must have access to their wallet or to the seed phrase that was created alongside the wallet. Likewise, an attacker only needs … Read more

Qvault’s Offline Mode in Electron

videoblocks hand plugging connecting unplugging and disconnecting ethernet cable wire cord from white wifi router top down shot hstu1hrvv thumbnail full01

We recently added “Offline Mode” to Qvault as a new feature. This was in preparation to also add Bitcoin and cryptocurrency key generation. There is now a toggle switch at the top of the app that, when switched off, ensures that the app will make no network requests. You have always been able to use … Read more

Security in Dependencies

photo 1495145910046 717b12bffcf7

Choosing the right dependencies is a difficult task. Assuming the developer of an application is the best programmer in the world, the “best” thing to do would be to write the entire codebase alone. This would eliminate the bugs, vulnerabilities, and malicious intrusions of inferior developers. The trouble is that we like to move quickly … Read more

Creating and Remembering a Strong Passphrase

photo 1509822929063 6b6cfc9b42f2

We all have hundreds of online accounts. Ideally, as many of those accounts as possible have unique passwords. Unique passwords however present a difficult problem: No one can remember hundreds of strong passwords. To fix this problem, we created password managers. Now, all of our passwords are neatly stored in one place, encrypted by one … Read more